{"title":"问责制和网络冲突:审查对使用网络代理的制度限制","authors":"W. Akoto","doi":"10.1177/07388942211051264","DOIUrl":null,"url":null,"abstract":"As state-sponsored cyber operations have proliferated, some states are outsourcing these operations to non-state cyber proxies. However, given the relative ease of outsourcing cyber operations, it is puzzling why more states are not engaged in this practice. I examine how domestic accountability institutions potentially explain this restraint in the use of cyber proxies. I argue that in cases where the incumbent is likely to be held to account for cyber operations, there is restraint in the use of proxies. Moreover, I distinguish vertical from horizontal accountability and argue that because vertical accountability mechanisms directly threaten the tenure of the incumbent if outsourced cyber operations go wrong, it has a greater constraining effect relative to horizontal accountability. I test these propositions with new data on the activities of several hacker groups and robustly confirm that accountability institutions do place significant constraints on the use of cyber proxies.","PeriodicalId":51488,"journal":{"name":"Conflict Management and Peace Science","volume":"39 1","pages":"311 - 332"},"PeriodicalIF":1.7000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies\",\"authors\":\"W. Akoto\",\"doi\":\"10.1177/07388942211051264\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As state-sponsored cyber operations have proliferated, some states are outsourcing these operations to non-state cyber proxies. However, given the relative ease of outsourcing cyber operations, it is puzzling why more states are not engaged in this practice. I examine how domestic accountability institutions potentially explain this restraint in the use of cyber proxies. I argue that in cases where the incumbent is likely to be held to account for cyber operations, there is restraint in the use of proxies. Moreover, I distinguish vertical from horizontal accountability and argue that because vertical accountability mechanisms directly threaten the tenure of the incumbent if outsourced cyber operations go wrong, it has a greater constraining effect relative to horizontal accountability. I test these propositions with new data on the activities of several hacker groups and robustly confirm that accountability institutions do place significant constraints on the use of cyber proxies.\",\"PeriodicalId\":51488,\"journal\":{\"name\":\"Conflict Management and Peace Science\",\"volume\":\"39 1\",\"pages\":\"311 - 332\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Conflict Management and Peace Science\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1177/07388942211051264\",\"RegionNum\":2,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Conflict Management and Peace Science","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1177/07388942211051264","RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies
As state-sponsored cyber operations have proliferated, some states are outsourcing these operations to non-state cyber proxies. However, given the relative ease of outsourcing cyber operations, it is puzzling why more states are not engaged in this practice. I examine how domestic accountability institutions potentially explain this restraint in the use of cyber proxies. I argue that in cases where the incumbent is likely to be held to account for cyber operations, there is restraint in the use of proxies. Moreover, I distinguish vertical from horizontal accountability and argue that because vertical accountability mechanisms directly threaten the tenure of the incumbent if outsourced cyber operations go wrong, it has a greater constraining effect relative to horizontal accountability. I test these propositions with new data on the activities of several hacker groups and robustly confirm that accountability institutions do place significant constraints on the use of cyber proxies.
期刊介绍:
Conflict Management and Peace Science is a peer-reviewed journal published five times a year from 2009. It contains scientific papers on topics such as: - international conflict; - arms races; - the effect of international trade on political interactions; - foreign policy decision making; - international mediation; - and game theoretic approaches to conflict and cooperation. Affiliated with the Peace Science Society (International), Conflict Management and Peace Science features original and review articles focused on news and events related to the scientific study of conflict and peace. Members of the Peace Science Society (International) receive an annual subscription to Conflict Management and Peace Science as a benefit of membership.